In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
2022-03-10T17:47:45.383
2024-11-21T06:54:02.590
Modified
CVSSv3.1: 7.0 (HIGH)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | python | python | ≤ 3.7.12 | Yes |
Application | python | python | ≤ 3.8.12 | Yes |
Application | python | python | ≤ 3.9.10 | Yes |
Application | python | python | ≤ 3.10.2 | Yes |
Application | python | python | 3.11.0 | Yes |
Application | python | python | 3.11.0 | Yes |
Application | python | python | 3.11.0 | Yes |
Application | python | python | 3.11.0 | Yes |
Application | python | python | 3.11.0 | Yes |
Application | python | python | 3.11.0 | Yes |
Operating System | microsoft | windows | - | No |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | ontap_select_deploy_administration_utility | - | Yes |